Search Constraints
« Previous |
1 - 50 of 89
|
Next »
Search Results
Select an image to start the slideshow
Representation learning on unstructured data
1 of 50
Combating attacks and abuse in large online communities
2 of 50
Mining Disparate Sources for Question Answering
3 of 50
Efficient deformations using custom coordinate systems
4 of 50
Novel network architectures for cloud-based applications
5 of 50
Opinion detection, sentiment analysis and user attribute detection from online text data
6 of 50
Analysis and improvements of the AKS algorithm
7 of 50
Are we using the crypto we want? : TLS cipher-suite negotiation and its discontents
8 of 50
Governance of cloud-hosted web applications
9 of 50
Memory page stability and its application to memory deduplication
10 of 50
Using workload prediction and federation to increase cloud utilization
11 of 50
Modeling and Calibrating the Distributed Camera
12 of 50
Information Reliability on the Social Web Models and Applications in Intelligent User Interfaces
13 of 50
Mining clinical data for trauma patients
14 of 50
Data model verification via theorem proving
15 of 50
Detecting the stealthy distribution of malicious and abusive content online
16 of 50
Mining and Managing Large-Scale Temporal Graphs
17 of 50
Understanding and Engaging Online Audiences
18 of 50
Contextualizing Network Security
19 of 50
Querying Large-scale Knowledge Graphs
20 of 50
Efficient Similarity Search with Cache-Conscious Data Traversal
21 of 50
Scalable automated evasive malware analysis
22 of 50
Configurable and Sound Static Analysis of JavaScript : Techniques and Applications
23 of 50
Analyzing and Defending Against Evolving Web Threats
24 of 50
Management of data and collaboration for business processes
25 of 50
Throughput and Delay on the Packet Switched Internet (A Cross-Disciplinary Approach)
26 of 50
Connecting text with knowledge
27 of 50
Optimizing JavaScript Engines for Modern-day Workloads
28 of 50
Programming Environments for Children : Creating a Language that Grows with you
29 of 50
Efficient Parallel Optimizations for All Pairs Similarity Search
30 of 50
Collocated data deduplication for virtual machine backup in the cloud
31 of 50
Stochastic Modeling of System Function in a Network of Biological Oscillators
32 of 50
Accelerated Algorithms for Stochastic Simulation of Chemically Reacting Systems
33 of 50
Automatic Model Reductions for Stochastic Simulation
34 of 50
On the validity of geosocial mobility traces
35 of 50
Advanced automated web application vulnerability analysis
36 of 50
Computing Volumes and Convex Hulls : Variations and Extensions
37 of 50
Estimating Confidences for Classifier Decisions using Extreme Value Theory
38 of 50
Analyzing and Processing Big Real Graphs
39 of 50
Improving Location Accuracy And Network Capacity In Mobile Networks
40 of 50
Elasticity primitives for database as a service
41 of 50
A visual analysis toolkit for microscopic image mosaics of retinal astrocytes
42 of 50
Enabling wide-scale computer science education through improved automated assessment tools
43 of 50
Scalable graph algorithms in a high-level language using primitives inspired by linear algebra
44 of 50
Analysis and verification of web application data models
45 of 50
Interactive remote collaboration using augmented reality
46 of 50
Geometric Pursuit Evasion
47 of 50
Modular wireless networks for infrastructure-challenged environments
48 of 50
Resource-efficient wireless systems for emerging wireless networks
49 of 50
Automatic Detection and Repair of Input Validation and Sanitization Bugs
50 of 50